yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Top Links You Must Click On

Prolexic Releases Threat Advisory to Detail Massive DDoS Threat from itsoknoproblembro
Multi-Tiered DDoS Toolkit Leveraged in Synchronized Attacks Against Banking, Hosting and Energy Industries

HOLLYWOOD, Fla., Jan. 3, 2013 /PRNewswire-iReach/ -- Prolexic, the global leader in Distributed Denial of Service (DDoS) protection services, today released a suite of detection and mitigation rules, a log analysis tool and a comprehensive threat advisory on the itsoknoproblembro DDoS toolkit. Considered to pose a very effective, multi-level threat, itsoknoproblembro has been the favored weapon in headline-making DDoS attacks against the US banking industry.


Malicious hackers are using the toolkit to target known vulnerabilities in web content management systems, including Joomla and WordPress, to infect web servers with malicious PHP scripts. The toolkit then leverages a unique, two-tier command mode that can launch multiple high-bandwidth attack types simultaneously. Some of these attacks have peaked at 70 Gbps and more than 30 million pps, a magnitude of traffic that demonstrably overwhelms most network infrastructures.

"Our security experts have successfully mitigated this threat multiple times, in tense, real-time digital battles," said Prolexic Chief Executive Officer Scott Hammack. "This toolkit, which was dangerous to begin with, has been evolving rapidly over the past year, and has been increasingly used in coordinated campaigns targeting specific industries. The December attacks against the banking industry represented the fourth documented campaign against finance companies; we've also documented smaller campaigns against the energy and hosting provider industries.

"Given the chatter in the hacker underground, we expect these itsoknoproblembro DDoS campaigns will continue to grow in frequency," Hammack added. "We want to support the security community by sharing our knowledge, so we can help eradicate this threat and remove these malicious scripts from infected machines before they do even more damage."

The Prolexic Security Engineering & Response Team (PLXsert) first issued a public warning about itsoknoproblembro in October. The toolkit was also profiled in Prolexic's Q3 2012 Attack Report.

The threat advisory issued today profiles 11 different attack signatures and provides detailed SNORT rules for DDoS mitigation. The attack vectors include POST, GET, TCP and UDP floods, with and without proxies, including a so-called Kamikaze GET flood script that can repeatedly relaunch automated attacks. 

Additionally, PLXsert published a set of detection rules to identify infected web servers (bRobots), along with a free log analysis tool that can be used to pinpoint which scripts were accessed, by what IP address and for what DDoS targets. Armed with this information, the infected servers can be sanitized, preventing them from being used in subsequent itsoknoproblembro campaigns.

"The nature of these threats requires the cooperation of everyone in the network protection community to work together," Hammack added. "Working with our fellow engineers and researchers, we will continue to provide free updates of this log analysis tool and encourage users to share their logs of compromised servers for continued analysis and refinement."

A complimentary copy of the full DDoS threat advisory, including mitigation rules and detection rules, as well as the log analysis tool, BroLog, are available for download at  

Additional information on the itsoknoproblembro attacks and other recent DDoS trends will be shared in the Prolexic Q4 2012 Global DDoS Attack Report later this month.

About PLXsert

PLXsert monitors malicious cyber threats globally and analyzes DDoS attacks using proprietary techniques and equipment. Through data forensics and post attack analysis, PLXsert is able to build a global view of DDoS attacks, which is shared with customers. By identifying the sources and associated attributes of individual attacks, the PLXsert team helps organizations adopt best practices and make more informed, proactive decisions about DDoS threats.

Details of Prolexic's mitigation activities and insights into the latest tactics, types, targets and origins of global DDoS attacks are provided in quarterly reports published by the company. A complimentary copy of Prolexic's Q4 2012 Global DDoS Attack Report will be available in January at

About Prolexic

Prolexic is the world's largest, most trusted Distributed Denial of Service (DDoS) mitigation provider. Able to absorb the largest and most complex attacks ever launched, Prolexic restores mission-critical Internet-facing infrastructures for global enterprises and government agencies within minutes. Ten of the world's largest banks and the leading companies in e-Commerce, SaaS, payment processing, travel/hospitality, gaming and other at-risk industries rely on Prolexic to protect their businesses. Founded in 2003 as the world's first in-the-cloud DDoS mitigation platform, Prolexic is headquartered in Hollywood, Florida and has scrubbing centers located in the Americas, Europe and Asia. To learn more about how Prolexic can stop DDoS attacks and protect your business, please visit, follow us on LinkedIn, Facebook, Google+ , YouTube , and @Prolexic on Twitter.

Michael E. Donner
SVP, Chief Marketing Officer
media {at} prolexic {dot} com
+1 (954) 620 6017

To view this video on YouTube, please visit:

Media Contact: Michael E. Donner Prolexic Technologies, 1 (954) 620-6017,

News distributed by PR Newswire iReach:

SOURCE Prolexic Technologies

About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
Developers generally like to share their code, and many of them do so by open sourcing it on GitHub, a social code hosting and collaboration service. Many companies also use GitHub as a convenient place to host both private and public code repositories by creating GitHub organizations ...
It is no surprise that OpenStack has evolved into a widely adopted cloud management framework. As it hurtles on a trajectory of rapid growth, a new breed of demands are making themselves felt – demands that a mature platform of this nature and scope must satisfy. One such requirement i...
The combined notions of open source and the ‘community contribution’ model of collaborative software application development are, of course, not new. The history of open source is actually traced back to early software exchanges between universities driven by academic principles of kn...
Test-driven development (TDD) has been around for a while now. Behavior-driven development (BDD), a comparably recent methodology, emerged from the practice of TDD and could reasonably be called a narrower application of TDD. The TDD process allows a developer to use a failing unit t...
Using any programming framework to the fullest extent possible first requires an understanding of advanced software architecture concepts. While writing a little client-side JavaScript does not necessarily require as much consideration when designing a scalable software architecture, t...
Cloud computing delivers on-demand IT resources that provide businesses flexibility. The challenge is the cost and complexity of cloud security compliance (PCI, HIPAA, FFIEC). Raxak Protect automated cloud security enables cloud apps to be deployed quickly and cost-effectively. Get the...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers